共 50 条
- [32] AP2Vec: An Unsupervised Approach for BGP Hijacking Detection IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (03): : 2255 - 2268
- [33] Detecting bogus BGP route information: Going beyond prefix hijacking 2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 381 - +
- [34] Preventing Activity Hijacking Attacks in Android APP PROCEEDINGS OF 2019 IEEE EURASIA CONFERENCE ON BIOMEDICAL ENGINEERING, HEALTHCARE AND SUSTAINABILITY (IEEE ECBIOS 2019), 2019, : 170 - 173
- [35] Distance Hijacking Attacks on Distance Bounding Protocols 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 113 - 127
- [36] Preventing Activity Hijacking Attacks in Android APP Proceedings of 2019 IEEE Eurasia Conference on Biomedical Engineering, Healthcare and Sustainability, ECBIOS 2019, 2019, : 170 - 173
- [37] Invisible QR-in-QR hijacking attacks Qinghua Daxue Xuebao/Journal of Tsinghua University, 2022, 62 (05): : 825 - 831
- [39] Heap Taichi: Exploiting Memory Allocation Granularity in Heap-Spraying Attacks 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), 2010, : 327 - 336
- [40] ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking PROCEEDINGS OF THE 2016 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION (SIGCOMM '16), 2016, : 625 - 626